[go: up one dir, main page]

Ali et al., 2018 - Google Patents

Gaze stability for liveness detection

Ali et al., 2018

View HTML
Document ID
2813883322786584115
Author
Ali A
Hoque S
Deravi F
Publication year
Publication venue
Pattern Analysis and Applications

External Links

Snippet

Spoofing attacks on biometric systems are one of the major impediments to their use for secure unattended applications. This paper explores features for face liveness detection based on tracking the gaze of the user. In the proposed approach, a visual stimulus is …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00228Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00597Acquiring or recognising eyes, e.g. iris verification

Similar Documents

Publication Publication Date Title
Czajka et al. Presentation attack detection for iris recognition: An assessment of the state-of-the-art
Ross et al. Some research problems in biometrics: The future beckons
Ramachandra et al. Presentation attack detection methods for face recognition systems: A comprehensive survey
Chingovska et al. Face recognition systems under spoofing attacks
Chen et al. Spoofing faces using makeup: An investigative study
Li et al. Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication
Ali et al. Gaze stability for liveness detection
US20190392145A1 (en) Detection of print-based spoofing attacks
CN108369785A (en) Activity determination
Rigas et al. Biometric recognition via probabilistic spatial projection of eye movement trajectories in dynamic visual environments
Ali et al. Liveness detection using gaze collinearity
CN106203369A (en) Active stochastic and dynamic for anti-counterfeiting recognition of face instructs generation system
Li et al. Empirical study of face authentication systems under OSNFD attacks
Ali et al. Directional sensitivity of gaze-collinearity features in liveness detection
Chou Presentation attack detection based on score level fusion and challenge-response technique.
Mittal et al. GOTCHA: Real-time video deepfake detection via challenge-response
Ali et al. Spoofing attempt detection using gaze colocation
Qin et al. Vulnerabilities of unattended face verification systems to facial components-based presentation attacks: An empirical study
Bagga et al. Spoofing detection in face recognition: A review
Alsufyani et al. Biometric presentation attack detection using gaze alignment
Kisku et al. Face spoofing and counter-spoofing: a survey of state-of-the-art algorithms
CN111723636A (en) Fraud detection using optokinetic responses
Ma et al. Multi-perspective dynamic features for cross-database face presentation attack detection
Agarwal et al. Biometrics in extended reality: a review
Xin et al. A survey of liveness detection methods for face biometric systems